Saw something on twitter today about using the old standby program, iexpress.exe, which is still available in Win10, you can package your powershell scripts inside an executable. You can use it to run malicious powershell scripts etc…
SO I was thinking of some fun things to do with it, getting reverse shells, dumping passwords with mimikatz, compiling .cs files etc to evade AV and whitelisting. It’s fairly simple to do ,here’s an example of a powershell reverse shell: Continue reading
Contact Me
Social Media
Categories
-
Recent Posts
RSS Blogroll
- Roundtable: Is DOGE Flouting Cybersecurity for US Data?
- Chinese APT 'Emperor Dragonfly' Moonlights With Ransomware
- How Public & Private Sectors Can Better Align Cyber Defense
- Japan Goes on Offense With New 'Active Cyber Defense' Bill
- sup
- Student Loan Breach Exposes 2.5M Records
- Watering Hole Attacks Push ScanBox Keylogger
- Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
- Ransomware Attacks are on the Rise
- Moving to gitlab
Archives
- March 2024
- May 2023
- April 2021
- January 2021
- July 2019
- May 2019
- September 2018
- June 2018
- October 2017
- September 2017
- June 2017
- May 2017
- April 2017
- December 2016
- November 2016
- October 2016
- July 2016
- May 2016
- April 2016
- March 2016
- January 2016
- October 2015
- July 2015
- May 2015
- March 2015
- February 2015
- January 2015
- November 2014
- October 2014
- September 2014
- June 2014
- March 2014
- February 2014
- September 2013
- June 2013
- April 2013
- January 2013
- March 2012
- February 2010
- September 2009